SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Scanstate /EFS:COPYRAW do?
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Migrates EFS encrypted files?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
2. What is a ns record?
It designates an authoritative DNS server - not the soa record.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Configure a firewall rule to the specific port and block all connections.
IN the WindowsUpdateClient log in the system log portion of event viewer.
3. What is an example of a rule based on file attributes derived from the digital signature?
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
4. What OSs disallow the uninstalliatin of IPV6?
Who can shutdown a computer
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Windows Vista - Window 7 and Server 2008.
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
5. What does the Storage Manager Report mmc allow you to do?
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
Use the Advanced Firewall to define Connection Security Rules.
Prevents the server from performing Internet name resolution.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
6. How do you display detailed Windows Activation and License status?
Run: Cscript slmgr.vbs /dl
They relay the status on polices to the Security center for NAP to validate the system to use the network.
IPSEC
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
7. How are RRAS/NPS policies evaluated?
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
an email address where the @ is replaced with a period.
driveletter:\\WindowsImageBackup\
8. What do you modify to define CD Autoplay settings and file associations?
Either from wbadmin or windows server backup.
Default Programs Control Panel applet
By running the Update Status summary report.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
9. What is the responsible person on a SOA records field?
It governs remote access and a user must meet the conditions of at least one of the policies.
an email address where the @ is replaced with a period.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
A type of port forwarding that allows public network computers on a Private network through nat devises.
10. What requirements must your system must meet to use BranchCache?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Delegate permission by configuring the dacl of the zone file.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
11. Where is scavaging configured?
IPV4 and IPV6
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
On the properties of the DNS server in the DNS manager.
12. What is a WSUS server?
WIndows Update Server
Use SYNC Center
Perform an offline migration
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
13. What does Reliability Monitor display?
Problem history but also application installation history.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
By running the Update Status summary report.
It backs up digitally identities to a password protected file.
14. Are Migrated user accounts are enabled by default?
It is the Microsoft SMB client for accessing shared network resources
No they are disabled
Disable AutoComplete in Internet Explorer
IN the WindowsUpdateClient log in the system log portion of event viewer.
15. What does the MigApp.xml file do?
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
IPV6 transition technologies
Pool Active Directory.
A type of port forwarding that allows public network computers on a Private network through nat devises.
16. How do you set a DNS server to a cache only DNS server?
Delete all the zone files or reinstall the DNS service.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
17. How many bits are in the site prefix?
4 (bits 53 - 56) /56 Allows for 16 regions
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Disable AutoComplete in Internet Explorer
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
18. What does netsh do?
DHCP server cannot assign an ip address
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
1723
Command to configure the TCP/IP settings.
19. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Anew vpn protocol that uses SSL (port 443) for encryption.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
Windows PE and Windows.old.
Sent across the network
20. What happens if the router advertisement has the M flag set to 0 but the other staeful configuration (o) flag set to 1?
Yes
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Delete all the zone files or reinstall the DNS service.
DHCPv6 obtains additional configuration settigns.
21. Where can Windows Backup backup a local drive to?
Does not
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
To another hard disk in the same computer - network or to removable media.
Pool Active Directory.
22. How do you create a VPN connection?
Contains a list of dynamically updated list of authorities for the zone.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
Use the "Connect to a Workplace" option
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
23. How does a autoconfiguration router or DHCP assign a IPV6 address (after the Local Link Address)?
Pool Active Directory.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
24. Can the Application Compatibility Kit can also search and report on the applications installed on a Windows 7 computer?
Yes
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
25. Why would a secondary DNS server stop responding to client queries?
Use dnscmd /recorddelete
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
Se a capture filter based on the mac address of the problem PC.
26. What does System Protection cover?
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Use the Programs and Features Control Panel applet to
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
27. What dows Windows Anytime Upgrade do?
Conditional forward
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
Use the Programs and Features Control Panel applet to
28. What does IMAGEX /SPLIT do?
Divide up a large WIM file into multiple smaller .SWM files
DHCP server cannot assign an ip address
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
29. What can NAP do?
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
It is a network health policy defines the minumum level of client health required to connect to the network.
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Place unhealthy computers in a quarantined network and auto-remediate clients.
30. What is IPsec Encapsulating Security Payload (ESP) tunnel?
Only sites added to the local Intranet Zones
Devices and Printers Control Panel applet has a
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
31. What is a Subscription in event viewer?
It can enable a windows feature on an offline image with the /Enable-Feature option
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Use Safe Mode and then roll back the driver if it was recently updated.
Us edit dnscmd /zoneupdatefromdns command.
32. What does DISM /Get-Drivers do?
Divide up a large WIM file into multiple smaller .SWM files
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Used to get a list of installed 3rd party drivers
33. How do you setup Ready Boost?
Conditional forward
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
34. What must you do if DHCP is not installed on the same computer as the RADIUS server?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Anew vpn protocol that uses SSL (port 443) for encryption.
IN the WindowsUpdateClient log in the system log portion of event viewer.
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
35. Why would you nest WSUS servers?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
Comes with the Windows Automated Installation Kit (WAIK)
Through a GPO.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
36. How do you review files in the Offline Files Cache?
Can be used to create virtual hard disks
Use it to can backup certificates to a .PFX file that is password protected.
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Use SYNC Center
37. What does NETSH BRANCHCACHE FLUSH do?
Vista SP1 and Server 2008 and above.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Clear the content being cached
Divide up a large WIM file into multiple smaller .SWM files
38. How can you delete route table entries?
Use the route delete command.
Which processes currently consume a resource like processor utilization.
Use the Cipher.exe command line tool.
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
39. What does it mean to Extend a Basic Disk Volume?
Does not have
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Drop both inbound and outbound traffic
Does not
40. What does Parental Controls do?
Restrict when a child can logon to a computer.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
41. What should you use for enhanced wireless security?
Yes
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
4 (bits 53 - 56) /56 Allows for 16 regions
Yes
42. What are soft disk quotas?
Prevents the server from performing Internet name resolution.
They are monitored but not enforced. Users can exced there quota limit.
Restrict when a child can logon to a computer.
Suggested Sites
43. Where is Software RAID is configured?
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
At the volume level - not the drive level.
44. How many bits are in the regional prefix?
IPV6 transition technologies
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
On the properties of the DNS server in the DNS manager.
4 (bits 49 - 52) /52 Allows for 16 regions.
45. How do you configure IPSEC?
On the properties of the DNS server in the DNS manager.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
46. What is WinRS?
Add an AD integrated zone
Use AD integrated zones so the clients can update to more than one DNS server.
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
47. What can Windows 7 Enterprise can be directly upgraded to?
wbadmin.exe. This can backup critical files.
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Windows 7 Ultimate.
48. How do you move a Dynamic Disk from one computer to another?
On the properties of the DNS server in the DNS manager.
Use the Import Foreign Disk option on the target computer
Use Safe Mode and then roll back the driver if it was recently updated.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
49. What does IMAGEX /MountRW do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. What is Bcdboot?
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Ping the Link Local Address (FE80 Address)
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify